s c a l e
play

s c a l e When Hardware Attacks Hardwear.io 27 September 2019 1 - PowerPoint PPT Presentation

s c a l e When Hardware Attacks Hardwear.io 27 September 2019 1 Attack exploitation space: time vs distance Remote key brute software protocol force relay attack side Fast Slow mitm channel Hardware attacks require: Hardware


  1. s c a l e When Hardware Attacks Hardwear.io 27 September 2019 1

  2. Attack exploitation space: time vs distance Remote key brute software protocol force relay attack side Fast Slow mitm channel Hardware attacks require: Hardware attacks β€’ hardware vulnerabilities, or fault β€’ hardware changes to target injection physical 2 Local

  3. 3 Attacker business case π‘ž = π‘œ βˆ— 𝑀 βˆ’ 𝑑 𝑀 βˆ’ 𝑑 𝑔 p = profit v = value n = replications c v = variable costs c f = fixed costs 3

  4. 4 Let’s analyze some known attacks 1.EMV Man-in-the-Middle Hardware attack to bypass PIN verification of stolen payment cards 2.Retail hack Network penetration attack to retrieve cardholder credentials 3.Card sharing Relay attack to avoid paying TV subscription fees 4

  5. 5 EMV Man-in-the-Middle (1) Source: https://www.cl.cam.ac.uk/research/security/banking/nopin/ 5

  6. 6 EMV Man-in-the-Middle (2) 6

  7. 7 Retail hack 7

  8. 8 Card sharing (1) β€’ Pay-TV decoders use smart cards to control video access β€’ Subscription is in smart card 8

  9. 9 Card sharing (2) β€’ Pay-TV decoders use smart cards to control video access β€’ Subscription is in smart card β€’ Distribution of session keys avoids need for individual subscriptions 9

  10. 10 Example attack business cases Attack Fixed Variable Value Replications Profit Cost Cost EMV MitM € 30K € 100 € 500 100 € 10 K Retail hack € 20K € 1 € 25 10K € 220 K Card sharing € 10K € 10 € 100 1M € 90 M Replications are key, but how is that bounded? β€’ Application size (e.g. #potential victims) β€’ Detection & mitigation β€’ Replication effort To determine scalability, we need to quantify the replication effort 10

  11. Attack phases and cost What parameters determine the attack cost? Identification Exploitation What it is finding a vulnerability replicate on target Frequency once repeated Speed How fast can we do this? Skill Required knowledge / experience Equipment Type of equipment Location Where is the attacker? Fixed cost Variable cost 11

  12. Attack parameters What are typical attack parameters? Identification Exploitation Vulnerability Hardware Software Hardware Software Speed slow slow slow fast Skill expert expert proficient layman Equipment specialized standard specialized none Location local near local remote Scalable attack Scalable attacks need software exploitation! 12

  13. 13 How to find software vulnerabilities? Black-Box White-Box Model Based Source Code Fuzzing Binary Analysis Testing Review Attackers method Defenders method Effectiveness Most vulnerabilities are found white-box style! 13

  14. 14 Finding vulnerabilities in source code Software packages typically β€’ vary between 10 and 10,000 KLoC β€’ have 0.1 up to 10 vulnerabilities per KLoC οƒ  All products have software vulnerabilities Manual source code review performs at 100 LoC/hr οƒ  Finding a vulnerability in source code may take just one day 14

  15. Binary analysis 15

  16. Disassemble 16

  17. Flow analysis 17

  18. 18 Software vulnerability hiding β€’ Given the widespread presence of vulnerabilities there is an increasing desire to mitigate risk β€’ Finding software vulnerabilities gets more difficult without access to source/binary code β€’ Access to device software is increasingly restricted: β€’ PC software used to be accessible (e.g. exe files) β€’ Smart phone software is only visible for root β€’ Set-Top-Box software is hidden, and encrypted in transit β€’ How to attack a product protected with software encryption? internal 18

  19. 19 Attacking encrypted software Start Binary analysis exposes Exploitation yields logical vulnerability runtime control Encrypted software hides binary code Start Black-Box penetration testing Exploitation yields exposes logical vulnerability runtime control Black-Box penetration testing very inefficient Start Hardware attack breaks Binary analysis exposes Exploitation yields software confidentiality logical vulnerability runtime control Hardware attack offers two-step alternative: 1. Break software confidentiality 2. White-box binary analysis exposes logical vulnerability 19

  20. Design flaw in Pay-TV SoC 20 Source: http://www.fredericb.info/2016/10/amlogic-s905-soc-bypassing-not-so.html

  21. 21 Secure boot chain broken by backdoor Attacker used hardware weakness to dump Boot Loader image Restricted 21

  22. Boot Loader header analysis struct aml_img_header { // 64 bytes unsigned char magic[4];// "@AML" uint32_t total_len; Code Certificate Signature uint8_t header_len; uint8_t unk_x9; uint8_t unk_xA; Hash Verify Get key uint8_t unk_xB; uint32_t unk_xC; uint32_t sig_type; Hashed code Public key Verified Sig uint32_t sig_offset; uint32_t sig_size; uint32_t data_offset; Select uint32_t unk_x20; uint32_t cert_offset; Compare uint32_t cert_size; uint32_t data_len; uint32_t unk_x30; Stop Go uint32_t code_offset; uint32_t code_len; sig_type provides backdoor uint32_t unk_x3C; } aml_img_header_t; 22 that bypasses verification 22

  23. 23 Conclusions β€’ Scalable attacks need software exploitation – Hardware attacks are laborious – Software vulnerabilities are ubiquitous – Software exploits are easy to replicate β€’ Software encryption is inevitable for security – Binary analysis very successful in identifying vulnerabilities – Increasing number of products use encrypted software β€’ Hardware attacks are scalable when – Software is encrypted – Shallow bugs (detectable black-box style) are absent – Used in the identification step to extract software – Deep software vulnerabilities are present 23

  24. Questions? contact: Riscure B.V. Frontier Building, Delftechpark 49 Marc Witteman 2628 XJ Delft The Netherlands Phone: +31 15 251 40 90 witteman@riscure.com www.riscure.com Riscure North America 550 Kearny St., Suite 330 San Francisco, CA 94108 USA Phone: +1 650 646 99 79 inforequest@riscure.com driving your security forward Riscure China Room 2030-31, No. 989, ChangleRoad, Shanghai 200031 China Phone: +86 21 5117 5435 inforcn@riscure.com Riscure is hiring, visit https://www.riscure.com/careers/

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend